[1] |
ZHAO W, ZHOU Kun, LI Junyi, et al. A Survey of Large Language Models[EB/OL]. (2023-11-24)[2024-04-05]. https://arxiv.org/abs/2303.18223.
|
[2] |
HAZHIRPASAND M, GHAFARI M, NIERSTRASZ O. Java Cryptography Uses in the Wild[C]// ACM. The 14th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM). New York: ACM, 2020: 1-6.
|
[3] |
ACAR Y, BACKES M, FAHL S, et al. You Get Where You’re Looking for: The Impact of Information Sources on Code Security[C]// IEEE. 2016 IEEE Symposium on Security and Privacy (SP). New York: IEEE, 2016: 289-305.
|
[4] |
KHOURY R, AVILA A R, BRUNELLE J, et al. How Secure is Code Generated by ChatGPT?[C]// IEEE. 2023 IEEE International Conference on Systems, Man, and Cybernetics (SMC). New York: IEEE, 2023: 2445-2451.
|
[5] |
PEARCE H, AHMAD B, TAN B, et al. Asleep at the Keyboard? Assessing the Security of Github Copilot’S Code Contributions[C]// IEEE. 2022 IEEE Symposium on Security and Privacy (SP). New York: IEEE, 2022: 754-768.
|
[6] |
FU Yujia, LIANG Peng, TAHIR A, et al. Security Weaknesses of Copilot Generated Code in GitHub[EB/OL]. (2024-04-04)[2024-04-05]. https://arxiv.org/abs/2310.02059.
|
[7] |
ELGEDAWY R, SADIK J, DUTTA S, et al. Ocassionally Secure: A Comparative Analysis of Code Generation Assistants[EB/OL]. (2024-02-01)[2024-04-05]. https://arxiv.org/abs/2402.00689.
|
[8] |
TONY C, MUTAS M, FERREYRA N E D, et al. Llmseceval: A Dataset of Natural Language Prompts for Security Evaluations[C]// IEEE. 2023 IEEE/ACM 20th International Conference on Mining Software Repositories (MSR). New York: IEEE, 2023: 588-592.
|
[9] |
RAHAMAN S, XIAO Ya, AFROSE S, et al. Cryptoguard: High Precision Detection of Cryptographic Vulnerabilities in Massive-Sized Java Projects[C]// ACM. The 2019 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2019: 2455-2472.
|
[10] |
LI Wenqing, JIA Shijie, LIU Limin, et al. Cryptogo: Automatic Detection of Go Cryptographic API Misuses[C]// ACM. The 38th Annual Computer Security Applications Conference. New York: ACM, 2022: 318-331.
|
[11] |
XU Bowen, JIA Shijie, LIN Jingqiang, et al. JWTKey: Automatic Cryptographic Vulnerability Detection in JWT Applications[C]// Springer. European Symposium on Research in Computer Security. Heidelberg: Springer, 2023: 263-282.
|
[12] |
CHEN Yikang, LIU Yibo, WU K L, et al. Towards Precise Reporting of Cryptographic Misuses[EB/OL]. (2024-03-01)[2024-04-05]. https://www.ndss-symposium.org/wp-content/uploads/2024-1032-paper.pdf.
|
[13] |
ZHOU Yongchao, MURESANU A I, HAN Ziwen, et al. Large Language Models are Human-Level Prompt Engineers[EB/OL]. (2023-03-10)[2024-04-05]. https://arxiv.org/abs/2211.01910.
|
[14] |
EKIN S. Prompt Engineering for ChatGPT: A Quick Guide to Techniques[EB/OL]. (2023-05-04)[2024-04-05]. https://www.techrxiv.org/doi/full/10.36227/techrxiv.22683919.v2.
|
[15] |
ELAINE B. NIST Special Publication 800-57 Part 1 Revision 5, Recommendation for Key Management, Part 1-General[EB/OL]. (2020-05-04)[2024-04-05]. https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r5.pdf.
|
[16] |
KLEIN A. Attacks on the RC4 Stream Cipher[J]. Designs, Codes and Cryptography, 2008, 48: 269-286.
|
[17] |
BLEICHENBACHER D. Chosen Ciphertext Attacks against Protocols Based on the RSA Encryption Standard PKCS# 1[C]// Springer. The 18th Annual International Cryptology Conference Santa Barbara (CRYPTO’98). Heidelberg: Springer, 1998: 1-12.
|
[18] |
KALISKI B, RUSCH A. RFC 8018: PKCS# 5: Password-Based Cryptography Specification Version 2.1[EB/OL]. (2017-01-01)[2024-04-05]. https://dl.acm.org/doi/10.17487/RFC8018.
|
[19] |
SVETLIN N. Practical Cryptography for Developers[EB/OL]. (2018-11-01)[2024-04-05]. https://cryptobook.nakov.com.
|
[20] |
VALLÉE-RAI R, CO P, GAGNON E, et al. Soot: A Java Bytecode Optimization Framework[C]// ACM. The 2010 Conference of the Centre for Advanced Studies on Collaborative Research. New York: ACM, 2010: 214-224.
|